An arbitrary file upload vulnerability in the importSettings method of VisiCut v2.1 allows attackers to execute arbitrary code via uploading a crafted Zip file.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Dec 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Visicut
Visicut visitcut |
|
Weaknesses | CWE-434 | |
CPEs | cpe:2.3:a:visicut:visitcut:2.1:*:*:*:*:*:*:* | |
Vendors & Products |
Visicut
Visicut visitcut |
|
Metrics |
cvssV3_1
|
Thu, 21 Nov 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An arbitrary file upload vulnerability in the importSettings method of VisiCut v2.1 allows attackers to execute arbitrary code via uploading a crafted Zip file. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-12-04T15:44:06.003Z
Reserved: 2024-10-28T00:00:00
Link: CVE-2024-51365

Updated: 2024-12-04T15:43:57.543Z

Status : Awaiting Analysis
Published: 2024-11-21T20:15:44.210
Modified: 2024-12-04T16:15:25.717
Link: CVE-2024-51365

No data.